Book description
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle.Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability.Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.
Publisher resources
Table of contents
- Security Warrior
- Dedication
- A Note Regarding Supplemental Files
- Preface
-
I. Software Cracking
- 1. Assembly Language
- 2. Windows Reverse Engineering
- 3. Linux Reverse Engineering
-
4. Windows CE Reverse Engineering
- 4.1. Windows CE Architecture
- 4.2. CE Reverse Engineering Fundamentals
- 4.3. Practical CE Reverse Engineering
- 4.4. Reverse Engineering serial.exe
- 4.5. References
- 5. Overflow Attacks
-
II. Network Stalking
- 6. TCP/IP Analysis
- 7. Social Engineering
- 8. Reconnaissance
- 9. OS Fingerprinting
- 10. Hiding the Tracks
-
III. Platform Attacks
-
11. Unix Defense
- 11.1. Unix Passwords
- 11.2. File Permissions
- 11.3. System Logging
- 11.4. Network Access in Unix
- 11.5. Unix Hardening
- 11.6. Unix Network Defense
- 11.7. References
- 12. Unix Attacks
- 13. Windows Client Attacks
-
14. Windows Server Attacks
- 14.1. Release History
- 14.2. Kerberos Authentication Attacks
- 14.3. Kerberos Authentication Review
- 14.4. Defeating Buffer Overflow Prevention
- 14.5. Active Directory Weaknesses
- 14.6. Hacking PKI
- 14.7. Smart Card Hacking
- 14.8. Encrypting File System Changes
- 14.9. Third-Party Encryption
- 14.10. References
- 15. SOAP XML Web Services Security
- 16. SQL Injection
- 17. Wireless Security
-
11. Unix Defense
-
IV. Advanced Defense
- 18. Audit Trail Analysis
- 19. Intrusion Detection Systems
- 20. Honeypots
- 21. Incident Response
- 22. Forensics and Antiforensics
- V. Appendix
- About the Authors
- Colophon
- Copyright
Product information
- Title: Security Warrior
- Author(s):
- Release date: January 2004
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9780596005450
You might also like
video
Securing Your Network from Attacks
Attacks on enterprise networks and home networks are a growing problem with daily targeted attacks that …
book
Protecting Your Web Applications
Websites, applications, and online services are critical business assets, but these services are also among the …
article
Managing Encryption Keys
This collection of shortcuts provides a practical and concise guide to securing cloud environments. It covers …
video
CCNA Cyber Ops SECFND 210-250
9+ Hours of Video Instruction Overview More than nine hours of video instruction on configuration and …